@@ -16,7 +16,6 @@ package envtest
1616import (
1717 "context"
1818 "fmt"
19- "io/ioutil"
2019 "net"
2120 "os"
2221 "path/filepath"
@@ -266,7 +265,7 @@ func (o *WebhookInstallOptions) setupCA() error {
266265 return fmt .Errorf ("unable to set up webhook serving certs: %w" , err )
267266 }
268267
269- localServingCertsDir , err := ioutil . TempDir ("" , "envtest-serving-certs-" )
268+ localServingCertsDir , err := os . MkdirTemp ("" , "envtest-serving-certs-" )
270269 o .LocalServingCertDir = localServingCertsDir
271270 if err != nil {
272271 return fmt .Errorf ("unable to create directory for webhook serving certs: %w" , err )
@@ -277,10 +276,10 @@ func (o *WebhookInstallOptions) setupCA() error {
277276 return fmt .Errorf ("unable to marshal webhook serving certs: %w" , err )
278277 }
279278
280- if err := ioutil .WriteFile (filepath .Join (localServingCertsDir , "tls.crt" ), certData , 0640 ); err != nil { //nolint:gosec
279+ if err := os .WriteFile (filepath .Join (localServingCertsDir , "tls.crt" ), certData , 0640 ); err != nil { //nolint:gosec
281280 return fmt .Errorf ("unable to write webhook serving cert to disk: %w" , err )
282281 }
283- if err := ioutil .WriteFile (filepath .Join (localServingCertsDir , "tls.key" ), keyData , 0640 ); err != nil { //nolint:gosec
282+ if err := os .WriteFile (filepath .Join (localServingCertsDir , "tls.key" ), keyData , 0640 ); err != nil { //nolint:gosec
284283 return fmt .Errorf ("unable to write webhook serving key to disk: %w" , err )
285284 }
286285
@@ -359,17 +358,23 @@ func parseWebhook(options *WebhookInstallOptions) error {
359358// returns slice of mutating and validating webhook configurations.
360359func readWebhooks (path string ) ([]* admissionv1.MutatingWebhookConfiguration , []* admissionv1.ValidatingWebhookConfiguration , error ) {
361360 // Get the webhook files
362- var files []os. FileInfo
361+ var files []string
363362 var err error
364363 log .V (1 ).Info ("reading Webhooks from path" , "path" , path )
365364 info , err := os .Stat (path )
366365 if err != nil {
367366 return nil , nil , err
368367 }
369368 if ! info .IsDir () {
370- path , files = filepath .Dir (path ), []os.FileInfo {info }
371- } else if files , err = ioutil .ReadDir (path ); err != nil {
372- return nil , nil , err
369+ path , files = filepath .Dir (path ), []string {info .Name ()}
370+ } else {
371+ entries , err := os .ReadDir (path )
372+ if err != nil {
373+ return nil , nil , err
374+ }
375+ for _ , e := range entries {
376+ files = append (files , e .Name ())
377+ }
373378 }
374379
375380 // file extensions that may contain Webhooks
@@ -379,12 +384,12 @@ func readWebhooks(path string) ([]*admissionv1.MutatingWebhookConfiguration, []*
379384 var valHooks []* admissionv1.ValidatingWebhookConfiguration
380385 for _ , file := range files {
381386 // Only parse allowlisted file types
382- if ! resourceExtensions .Has (filepath .Ext (file . Name () )) {
387+ if ! resourceExtensions .Has (filepath .Ext (file )) {
383388 continue
384389 }
385390
386391 // Unmarshal Webhooks from file into structs
387- docs , err := readDocuments (filepath .Join (path , file . Name () ))
392+ docs , err := readDocuments (filepath .Join (path , file ))
388393 if err != nil {
389394 return nil , nil , err
390395 }
@@ -422,7 +427,7 @@ func readWebhooks(path string) ([]*admissionv1.MutatingWebhookConfiguration, []*
422427 }
423428 }
424429
425- log .V (1 ).Info ("read webhooks from file" , "file" , file . Name () )
430+ log .V (1 ).Info ("read webhooks from file" , "file" , file )
426431 }
427432 return mutHooks , valHooks , nil
428433}
0 commit comments